General

  • Target

    e1973d504cdea16c557c1d7640e3b434c1e5005af9d053b40d2ffb34270b36b5

  • Size

    1.3MB

  • MD5

    37f679207af069a0d5e9c1389a52bc3c

  • SHA1

    bc302281a450479905b57ae000ee4171b6a37d73

  • SHA256

    e1973d504cdea16c557c1d7640e3b434c1e5005af9d053b40d2ffb34270b36b5

  • SHA512

    4df41b889ff64cda58f2dbfaffa2c01cff6cd1a36a3c45836d7eb4d8a0e7c6850ec831132e6c9390e6466221140459360a1147f50b17dd343127b652f643123a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e1973d504cdea16c557c1d7640e3b434c1e5005af9d053b40d2ffb34270b36b5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections